Rethinking Communication Influence from a Strategic Communication Approach

Rethinking Communication Influence from a Strategic Communication Approach

Rethinking Communication Influence from a Strategic Communication Approach Authors | Editors: Lieber, P. (US Special Operations Command (USSOCOM) Joint Special Operations University (JSOU)); Canna, S. (NSI, Inc.) Executive Summary For over a decade, many within US...
Discrete, Specified, Assigned, and Bounded Problems: The Appropriate Areas for AI Contributions to National Security

Discrete, Specified, Assigned, and Bounded Problems: The Appropriate Areas for AI Contributions to National Security

“Discrete, Specified, Assigned, and Bounded Problems: The Appropriate Areas for AI Contributions to National Security” Author | Editor: Rogers, Z. (Flinders University of South Australia); Canna, S. (NSI, Inc.) Executive Summary The cluster of technologies...
Contextualizing the Gray Rhino: The Central American “Cycle of Violence” as a Catalyst to Migration

Contextualizing the Gray Rhino: The Central American “Cycle of Violence” as a Catalyst to Migration

“Contextualizing the Gray Rhino: The Central American ‘Cycle of Violence’ as a Catalyst to Migration” Speaker: Cooley, S. (Oklahoma State University) Date: 13 December 2019 Speaker Session Preview SMA hosted a speaker...
Chinese Strategic Intentions:  A Deep Dive into China’s  Worldwide Activities

Chinese Strategic Intentions: A Deep Dive into China’s Worldwide Activities

“Chinese Strategic Intentions: A Deep Dive into China’s Worldwide Activities” Authors | Editors: Allen, G. (Center for a New American Security (CNAS)); Astorino-Courtois, A. (NSI, Inc.); Beckley, M. (Tufts University); Bragg, B. (NSI, Inc.);...